DocumentCode :
2408663
Title :
IDGraphs: intrusion detection and analysis using histographs
Author :
Ren, Pin ; Gao, Yan ; Li, Zhichun ; Chen, Yan ; Watson, Benjamin
fYear :
2005
fDate :
26 Oct. 2005
Firstpage :
39
Lastpage :
46
Abstract :
Traffic anomalies and attacks are commonplace in today´s networks and identifying them rapidly and accurately is critical for large network operators. For a statistical intrusion detection system (IDS), it is crucial to detect at the flow-level for accurate detection and mitigation. However, existing IDS systems offer only limited support for: 1) interactively examining detected intrusions and anomalies; 2) analyzing worm propagation patterns; 3) and discovering correlated attacks. These problems are becoming even more acute as the traffic on today´s high-speed routers continues to grow. IDGraphs is an interactive visualization system for intrusion detection that addresses these challenges. The central visualization in the system is a flow-level trace plotted with time on the horizontal axis and aggregated number of unsuccessful connections on the vertical axis. We then summarize a stack of tens or hundreds of thousands of these traces using the histographs (Pin Ren and Watson, 2005) technique, which maps data frequency at each pixel to brightness. Users may then interactively query the summary view, performing analysis by highlighting subsets of the traces. For example, brushing a linked correlation matrix view highlights traces with similar patterns, revealing distributed attacks that are difficult to detect using standard statistical analysis. We apply IDGraphs system to a real network router data-set with 179M flow-level records representing a total traffic of 1.16TB. The system successfully detects and analyzes a variety of attacks and anomalies, including port scanning, worm outbreaks, stealthy TCP SYN floodings, and some distributed attacks.
Keywords :
data visualisation; security of data; telecommunication security; IDGraphs; correlated attack discovery; distributed attacks; flow-level trace; histographs; interactive visualization system; port scanning; statistical intrusion detection system; stealthy TCP SYN flooding; traffic anomaly; worm outbreaks; worm propagation pattern analysis; Computer interfaces; Computer networks; Computer security; Computer worms; Information security; Intrusion detection; Invasive software; Management information systems; Protection; Visualization;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Visualization for Computer Security, 2005. (VizSEC 05). IEEE Workshop on
Print_ISBN :
0-7803-9477-1
Type :
conf
DOI :
10.1109/VIZSEC.2005.1532064
Filename :
1532064
Link To Document :
بازگشت